Advertisement

From Mechatronics to the Cloud

  • David BradleyEmail author
  • David Russell
  • Peter Hehenberger
  • Jorge Azorin-Lopez
  • Steve Watt
  • Christopher Milne
Chapter

Abstract

At its conception mechatronics was viewed purely in terms of the ability to integrate the technologies of mechanical and electrical engineering with computer science to transfer functionality, and hence complexity, from the mechanical domain to the software domain. However, as technologies, and in particular computing technologies, have evolved so the nature of mechatronics has changed from being purely associated with essentially stand-alone systems such as robots to providing the smart objects and systems which are the building blocks for Cyber-Physical Systems, and hence for Internet of Things and Cloud-based systems. With the possible advent of a 4th Industrial Revolution structured around these systems level concepts, mechatronics must again adapt its world view, if not its underlying technologies, to meet this new challenge.

References

  1. 1.
    Dorogovtsev, S. N., & Mendes, J. F. (2002). Evolution of networks. Advances in Physics, 51(4), 1079–1187.CrossRefGoogle Scholar
  2. 2.
    Mattern, F., & Floerkemeier, C. (2010). From the Internet of Computers to the Internet of Things. In From active data management to event-based systems and more (pp. 242–259). Berlin: Springer.Google Scholar
  3. 3.
    Dhamdhere, A., & Dovrolis, C. (2011). Twelve years in the evolution of the internet ecosystem. IEEE/ACM Transactions on Networking, 19(5), 1420–1433.CrossRefGoogle Scholar
  4. 4.
    Foster, I., Zhao, Y., Raicu, I., & Lu, S. (2008). Cloud computing and grid computing 360-degree compared. In IEEE Grid Computing Environments Workshop (GCE’08) (pp. 1–10).Google Scholar
  5. 5.
    Bradley, D. A., Russell, D., Ferguson, I., Isaacs, J., & White, R. (2015). The Internet of Things—The future or the end of mechatronics. Mechatronics, 27, 57–74.CrossRefGoogle Scholar
  6. 6.
    Lee, E. A., & Seshia, S. A. (2016). Introduction to embedded systems: A cyber-physical systems approach. MIT Press.Google Scholar
  7. 7.
    Minerva, R., Biru, A., & Rotondi, D. (2015). Towards a definition of the Internet of Things. IEEE Internet Initiative, 1, 1–86.Google Scholar
  8. 8.
    Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC Press.Google Scholar
  9. 9.
    Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: from big data to big impact. MIS Quarterly, 1165–1188.Google Scholar
  10. 10.
    Iorga, M., Feldman, L., Barton, R., Martin, M. J., Goren, N., & Mahmoudi, C. (2017). The NIST definition of fog computing (Draft), NIST Special Publication 800-191.Google Scholar
  11. 11.
    Datta, S. K., Bonnet, C., & Haerri, J. (2015). Fog computing architecture to enable consumer centric Internet of Things services, IEEE International Symposium on Consumer Electronics (ISCE) (pp. 1–2).Google Scholar
  12. 12.
    Yi, S., Li, C., & Li, Q. (2015). A survey of fog computing: Concepts, applications and issues. In Proceedings of the 2015 Workshop on Mobile Big Data (pp. 37–42).Google Scholar
  13. 13.
    Gupta, H., Vahid Dastjerdi, A., Ghosh, S. K., & Buyya, R. (2017). iFogSim: A toolkit for modelling and simulation of resource management techniques in the Internet of Things. Edge and Fog Computing Environments, Software: Practice & Experience, 47(9), 1275–1296.Google Scholar
  14. 14.
    Munir, A., Kansakar, P., & Khan, S. U. (2017). IFCIoT: Integrated fog cloud IoT architectural paradigm for future internet of things. IEEE Consumer Electronics Magazine, 6(3), 74–82.CrossRefGoogle Scholar
  15. 15.
    World Economic Forum Report Survey Report. (2015). Deep Shift—Technology Tipping Points and Societal Impact @ www3.weforum.org/docs/WEF_GAC15_Technological_Tipping_Points_report_2015.pdf. Accessed December 20, 2017.
  16. 16.
    Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.CrossRefGoogle Scholar
  17. 17.
    Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: A survey. Future Generation Computer Systems, 56, 684–700.CrossRefGoogle Scholar
  18. 18.
    Weyrich, M., & Ebert, C. (2016). Reference architectures for the Internet of Things. IEEE Software, 33(1), 112–116.CrossRefGoogle Scholar
  19. 19.
    Yang, Z., Yue, Y., Yang, Y., Peng, Y., Wang, X., & Liu, W. (2011). Study and application on the architecture and key technologies for IoT. IEEE International Conference on Multimedia Technology (pp. 747–751).Google Scholar
  20. 20.
    Wu, D., Rosen, D. W., Wang, L., & Schaefer, D. (2014). Cloud-based manufacturing: Old wine in new bottles? Procedia CIRP, 17, 94–99.CrossRefGoogle Scholar
  21. 21.
    Wang, P., Gao, R. X., & Fan, Z. (2015). Cloud computing for cloud manufacturing: Benefits and limitations. ASME Journal of Manufacturing Science and Engineering, 137(4), 040901.CrossRefGoogle Scholar
  22. 22.
    Facts & Data on Small Business and Entrepreneurship @ sbecouncil.org/about-us/facts-and-data/. Accessed October 4, 2018.Google Scholar
  23. 23.
    Schaar, P. (2010). Privacy by design. Identity in the Information Society, 3(2), 267–274.CrossRefGoogle Scholar
  24. 24.
    Cavoukian, A., Taylor, S., & Abrams, M. E. (2010). Privacy by design: Essential for organizational accountability and strong business practices. Identity in the Information Society, 3(2), 405–413.CrossRefGoogle Scholar
  25. 25.
    Radomirovic, S. (2010). Towards a model for security and privacy in the Internet of Things. In Proceedings of the 1st International Workshop on Security of the Internet of Things, Tokyo.Google Scholar
  26. 26.
    Weber, R. H. (2010). Internet of Things—New security and privacy challenges. Computer Law & Security Review, 26, 23–30.MathSciNetCrossRefGoogle Scholar
  27. 27.
    British Standards Institute. (2017). PAS 185:2017 Smart Cities—Specification for establishing and implementing a security-minded approach, BSI.Google Scholar
  28. 28.
    Roman, R., Zhou, Jianying, & Lopez, J. (2013). On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57, 2266–2279.CrossRefGoogle Scholar
  29. 29.
    Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the Internet of Things: A Review. In Proceedings of the International Conference on Computer Science and Electronics Engineering, (ICCSEE) (pp. 648–651).Google Scholar
  30. 30.
    Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the Internet of Things: Perspectives and challenges. Wireless Networks, 20, 2481–2501.CrossRefGoogle Scholar
  31. 31.
    O’Neill, C. (2017). Weapons of math destruction, Penguin.Google Scholar
  32. 32.
    Kambatla, K., Kollias, G., Kumar, V., & Grama, A. (2014). Trends in big data analytics. Journal of Parallel & Distributed Computing, 74(7), 2561–2573.CrossRefGoogle Scholar
  33. 33.
    Chen, H., Chiang, R. H. L., & Storey, V. C. (2012). Business intelligence & analytics: From big data to big impact. MIS Quarterly, 36(4), 1165–1188.CrossRefGoogle Scholar
  34. 34.
    Raghupathi, W., & Raghupathi, V. (2014). Big data analytics in healthcare: Promise and potential. Health Information Science and Systems (Online), 2(1), 3.CrossRefGoogle Scholar
  35. 35.
    Lazer, D., Kennedy, R., King, G., & Vespignani, A. (2014). The parable of Google Flu: Traps in big data analysis. Science, 343, 1203–1205.CrossRefGoogle Scholar
  36. 36.
    Panniello, U., Tuzhilin, A., & Gorgoglione, M. (2012). Comparing context aware recommender systems in terms of accuracy and diversity. User Modelling & User-Adapted Interaction, 24(1), 35–65.Google Scholar
  37. 37.
    Kroll, J. A., Barocas, S., Felten, E. W., Reidenberg, J. R., Robinson, D. G., & Yu, H. (2016). Accountable algorithms. U P. Law. Review, 165, 633–705.Google Scholar
  38. 38.
    Kim, P. T. (2017). Auditing algorithms for discrimination. U. Pa Law Review Online, 166(1), 189–203.Google Scholar
  39. 39.
    Danks, D., & London, A. J. (2017). Algorithmic bias in autonomous systems. In Proceedings of the 26th International Joint Conference on Artificial Intelligence (pp. 4691–4697).Google Scholar
  40. 40.
    Goodman, B. W., Flaxman, S. (2016). EU regulations on algorithmic decision-making and a “right to explanation”. In ICML Workshop Human Interpretability in Machine Learning, New York (pp. 26–30).Google Scholar
  41. 41.
    Landau, S. (2015). Control use of Data to Protect Privacy. Science - Special Issue The End of Privacy, 347(6221), 504–506.CrossRefGoogle Scholar
  42. 42.
    Watt, S., Milne, C., Bradley, D., Russell, D., Hehenberger, P., & Azorin-Lopez, J. (2016). Privacy matters-issues within mechatronics. IFAC-PapersOnLine, 49(21), 423–430.CrossRefGoogle Scholar
  43. 43.
    Spangler, T. (2017). Self-driving cars programmed to decide who dies in a crash, USA Today @ eu.usatoday.com/story/money/cars/2017/11/23/self-driving-cars-programmed-decide-who-dies-crash/891493001/. Accessed October 4, 2018.Google Scholar
  44. 44.
    Goodall, N. J. (2016). Can you program ethics into a self-driving car? IEEE Spectrum, 53(6), 28–58.CrossRefGoogle Scholar
  45. 45.
    Sparrow, R., & Howard, M. (2017). When human beings are like drunk robots: Driverless vehicles, ethics, and the future of transport. Transportation Research Pt C: Emerging Technologies, 80, 206–215.CrossRefGoogle Scholar
  46. 46.
    Bonnefon, J. F., Shariff, A., & Rahwan, I. (2016). The social dilemma of autonomous vehicles. Science, 352(6293), 1573–1576.CrossRefGoogle Scholar
  47. 47.
    Rogers, C., & Duranti, L. (2017). Ethics in the Cloud. Journal of Contemporary Archival Studies, 4(2), 1–11.Google Scholar
  48. 48.
    de Bruin, B., & Floridi, L. (2017). The ethics of cloud computing. Science and Engineering Ethics, 23(1), 21–39.CrossRefGoogle Scholar
  49. 49.
    World Economic Forum White Paper. (2017). Shaping the Future Implications of Digital Media for Society - Valuing Personal Data and Rebuilding Trust @ www3.wefrum.org/docs/WEF_End_User_Perspective_on_Digital_Media_Survey_Summary_2017.pdf. Accessed December 20, 2017.
  50. 50.
    Xu, X. (2012). From cloud computing to cloud manufacturing. Robotics & Computer Integrated Manufacturing, 28(1), 75–86.CrossRefGoogle Scholar
  51. 51.
    Tiefenbeck, V., Tasic, V., Schob, S., & Staake, T. (2013). Mechatronics to drive environmental sustainability: Measuring, visualizing and transforming consumer patterns on a large scale. In IEEE Industrial Electronics Society 39th Annual Conference (IECON 2013) (pp. 4768–4773).Google Scholar
  52. 52.
    Edwards, B. (2014). Rough guide to sustainability: A design primer, RIBA Publishing.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • David Bradley
    • 1
    Email author
  • David Russell
    • 2
  • Peter Hehenberger
    • 3
  • Jorge Azorin-Lopez
    • 4
  • Steve Watt
    • 5
  • Christopher Milne
    • 5
  1. 1.Abertay UniversityDundeeUK
  2. 2.Penn State Great ValleyMalvernUSA
  3. 3.University of Applied Sciences Upper AustriaWelsAustria
  4. 4.University of AlicanteAlicanteSpain
  5. 5.University of St AndrewsSt AndrewsUK

Personalised recommendations